Email or username:

Password:

Forgot your password?
4 posts total
Marcus

If you verified your identity with #Twitter ( #X ), #Uber or #TikTok, your identity may be at risk.

Headline: ID Verification Service for TikTok, Uber, X Exposed Driver Licenses

Subtitle: As social networks and porn sites move towards a verified identity model, the actions of one #cybersecurity researcher show that ID verification services themselves could get hacked too.

Source: 404media.co/id-verification-se

#Privacy #Security

If you verified your identity with #Twitter ( #X ), #Uber or #TikTok, your identity may be at risk.

Headline: ID Verification Service for TikTok, Uber, X Exposed Driver Licenses

Subtitle: As social networks and porn sites move towards a verified identity model, the actions of one #cybersecurity researcher show that ID verification services themselves could get hacked too.

Jonathan Lamothe

@gerowen Perhaps I should read the article itself, but the summary makes it sound like a nothing burger.

As social networks and porn sites move towards a verified identity model, the actions of one #cybersecurity researcher show that ID verification services themselves could get hacked too.


Of course they could get hacked. Name me a service that couldn't. Does the article mention anything that makes them particularly vulnerable, or is it just about how bad such a hack would potentially be because of the nature of the information they store?

Edit: typo

Edit 2: Oh. That's not good.

@gerowen Perhaps I should read the article itself, but the summary makes it sound like a nothing burger.

As social networks and porn sites move towards a verified identity model, the actions of one #cybersecurity researcher show that ID verification services themselves could get hacked too.


Of course they could get hacked. Name me a service that couldn't. Does the article mention anything that makes them particularly vulnerable, or is it just about how bad such a hack would potentially be because...

Marcus

Today I discovered the #MagicWormhole protocol. There are desktop and mobile apps and it essentially allows the transfer of a file between any two computers, as long as they are both online. You select a file, it generates both a QR code and a seed phrase of sorts that you can then give to a recipient to plug into their application, and transfer a file. I have my own home server, but for one off transfers of files that are too big for email or a messenger, this would be easier.

#Wormhole

A screenshot of an Android app that supports "Magic Wormhole".  A QR code and a phrase consisting of 4 words and a number are displayed on screen.
Eric Phelps

@gerowen github.com/timvisee/send-insta

Private, encrypted, open-source file transfer. It used to be "Firefox Send", but Mozilla discovered people sent things Mozilla wanted no part of. So since it was open source, other people started running servers. I find it's super useful for transferring log files around the world.

Marcus

The sound didn't get captured, but I recently started hosting my own #Minetest / #Mineclone2 server here at home for my close family, and this is an experimental build for defending my home when it's dark outside. The monsters are a LOT more aggressive in this than in regular Minecraft, and there's more of them. I did widen the hole out to be 3 long by 2 wide so that spiders will fit down it.

#gaming #pcgaming

✨ Masta Live ✨
@gerowen Oh, we also got private server that @sarahquartz runs for us. Can confirm - mobs are very aggressive, especially creepers :ablobfoxbongoterrified:
Marcus

If you use #GMail, #Google keeps records of everything you buy, even if you delete the email receipt, and even if you didn't buy the product from them. Here's metadata from my takeout showing price, delivery address, description, vendor, etc. #privacy

Go Up